A program routine that destroys data when certain conditions are met; for example, it may reformat the hard disk or insert random bits into data files on a certain date or if a particular employee record is missing from the employee database. Many viruses are logic bombs because they deliver their payload after a specific latency or when a trigger event occurs. See virus, latency and payload.
--External forms of malicious logic that operate from outside of the MedIS, e.g., malware-induced DoS.
System profiles often employ digitally signed databases and may incorporate file system checks that bypass normal operating system facilities in order to detect the more sophisticated checksum aware malicious logic.
A single standardized solution to the issues raised by malicious logic cannot be offered in this paper.